On Monday the 21st of January an issue was identified with Apples FaceTime application. A feature within FaceTime used for a group call can turn a remote iPhone into a listening bug. In some circumstances and remote video camera. This poses a critical privacy risk as it allows anyone using Facetime to hear or see you before you even answer.
Gibraltar based Hedgehog Cyber Security tested the original reported bug using an iPhone X running the latest iOS 12.1.2 and confirmed that it works, as flagged by 9to5Mac on Monday morning. They were then able to extend the issue through a series of MacBooks. The problem seemed to exist everywhere that FaceTime did.
The issue was reported to Apple who took this issue very seriously. At the moment Apple has disabled FaceTime group calling until a fix has been implemented and a patch for numerous IOS devices is expected shortly.
So far this has been widely reported as a hack although it isn’t. It is more an unintended snafu in the facetime application on Apple devices. However, if you own an Apple device, turn Off FaceTime immediately, and then get the Apple update that is coming out this week. Alternatively, next.
So how does the issue work?
“If you had a keen interest in a person and you knew that that person had an iPhone, you could call them using FaceTime. While it is dialling you simple add yourself as a group caller and even if the other person does not answer you can hear everything through the microphone of those persons iPhone. The issue is worse if they hit the mute button or turn the volume down because that causes the video camera to activate and you get a live video stream.”
So what is the risk? Well, as Peter Bassill, CEO at Hedgehog Cyber Security points out:
“This is yet another example of where it is possible to turn a device from a day to day item into a listening bug. We have seen similar issues with children’s toys and games through to regular household appliances. This particular issue though is slightly different in that it is a mass consumer device and there are millions around the world. More than 7500 within Gibraltar itself. While there are certainly commercial risks with this, there is a massive child safety and welfare risk attached to this and similar vulnerabilities. With only the audio enablement things are bad enough, but if the call is through to a child and they hit mute or turn down the volume, and the camera is enabled then there is a significantly larger concern. The thought that a random person would be able to eavesdrop on my children and possibly enable a live video feed without them being aware chills me to the bone.”
What about within the commercial world? Would company phones with anti-malware be protected?
“A great point and sadly no, they would not be protected. The issue is with the underlying code within FaceTime. It would be easier to think of it as more of an unknown and unwanted feature within FaceTime. Endpoint protection software simply is not going to protect you and the handset. The only real protection is to disable FaceTime.”
What Peter says about Gibraltar:
“For Gibraltar, there is a very strong iPhone user base. In our State of Cyber Security Gibraltar research, we identified slightly more than 7500 unique iPhone and iPad devices in and around Gibraltar. That would be a significant area of coverage if you wanted to listen to meetings and conversations. Typically the populace are trusting of their devices, and on the whole, this is fine and right. Gibraltar is one of the centres for financial trading, and with the development of the crypto-based currency market there is certainly scope for misuse of devices to gain competitive advantages for the unscrupulous person.”
The advice from the team at Hedgehog Cyber is to disable FaceTime for the time being and then re-enable it once the next major IOS update has been installed.
Peter has been in the Information Security world since 1999 and in IT in general since 1996. His work history contains a unique blended balance between the development of exceptional technical capabilities and business knowledge. Peter is a proud father of twins and enjoys GT endurance racing on the weekends.
Last week saw SB Tech Breached by the hacking group Maze. It seems that every week the group are announcing more victims. GameOn asked our CEO Peter Bassill, to give us some insight into the attack. The GameOn article is here.
In our “How to securely” series we asked our followers what tools they would like a simple guide on to help them stay secure online. There seemed to be a lot of confusion as to what a VPN is and why you should or should not use one. So we asked Peter to help.
WhatsApp is among the fastest-growing instant messengers out there, and almost a social network in its own way. But if you are using it, there are some steps you should take to protect your security and privacy.
The UK’s highest court ruled that Morrisons can not be liable for a criminal act of a person seeking to harm their business. On April 1st, 2020, a panel of five justices unanimously ruled that Morrisons was not “vicariously liable”.
With the current pandemic situation, we all need to be taking remote working considerations. While adjusting the work paradym, it is vital to keep a mind’s eye on the security and safety of the businesses information assets
In this guide we are looking at how to go about securing zoom. Since the onset of the global pandemic, we have seen surge in “zoom bombing”. This is where people with malicious intent look for in-progress zoom meetings to join and cause trouble.
A critical vulnerabiltiy has been identified in Dell EMC iDRAC7, iDRAC8 and iDRAC9. Some unknown processing is affected by this issue. Manipulation with an unknown input can lead to stack based memory corruption.
On March 27th, Hiscox Insurance Company Inc. filed a complaint against law firm Warden Grier for concealing a data breach that occurred back in 2016.
A critical vulnerability has been identified in Nginx Controller up to 3.1.x (web server,) affecting an unknown code block of the component Controller API.